Image Title

Search Results for David Locke:

Charlie Kwon, IBM | Actifio Data Driven 2019


 

>> from Boston, Massachusetts. It's the queue covering active eo 2019. Data driven you by activity. >> Welcome back to Boston. Everybody watching the Cube, the leader and on the ground tech coverage. My name is David Locke. They still minimus here. John Barrier is also in the house. We're covering the active FIO data driven 19 event. Second year for this conference. It's all about data. It's all about being data driven. Charlie Quanis here. He's the director of data and a I offering management and IBM. Charlie, thanks for coming on The Cube. >> Happy to be here. Thank you. >> So active Theo has had a long history with IBM. Effect with company got started at a time the marketplace took a virtual ization product and allowed them to be be first really and then get heavily into the data virtualization. They since evolved that you guys are doing a lot of partnerships together. We're going to get into that, But talk about your role with an IBM and you know, what is this data and a I offering management thing? >> He absolutely eso data and a I is our business unit within IBN Overall Corporation, our focus and our mission is really about helping our customers drive better business outcomes through data. Leveraging data in the contacts and the pursuit of analytics and artificial intelligence are augmented intelligence. >> So >> a portion of the business that I'm part of his unified governance and integration and you think about data and I as a whole, you could think about it in the context of the latter day. I often times when we talk about data and I we talk about the foundational principles and capabilities that are required to help companies and our customers progress on their journey. They II and it really is about the information architecture that we help them build. That information architectures essentially a foundational prerequisite around that journey to a i. R. Analytics and those layers of the latter day I r. Collecting the data and making sure you haven't easily accessible to the individual's need it organizing the data. That's where the unified governance in Immigration folio comes into play. Building trusted business ready data, high quality with governance around that making shorts available to be used later, thie analyzed layer in terms of leveraging the data for analytics and die and then infuse across the organization, leveraging those models across the organization. So within that context of data and I, we partnered with Active Theo at the end of 2018. >> So before we get into that, I have started dropped. You know, probably Rob Thomas is, and I want a double click on what you just said. Rob Thomas is is famous for saying There is no way I without a training, no, no artificial intelligence without information architecture so sounds good. You talk about governance. That's obviously part of it. But what does that mean? No A without a. >> So it is really about the fundamental prerequisites to be able to have the underlying infrastructure around the data assets that you have. A fundamental tenet is that data is one of your tremendous assets. Any enterprise may have a lot of time, and effort has been spent investing and man hours invested into collecting the data, making sure it's available. But at the same time, it hasn't been freed up to be. A ploy used for downstream purpose is whether it's operational use cases or analytical cases, and the information architecture is really about How do you frame your data strategy so that you have that data available to use and to drive business outcomes later. And those business outcomes, maybe results of insights that are driven out of the way the data but they got could also be part of the data pipeline that goes into feeding things like application development or test data management. And that's one of the areas that were working with that feeling. >> So the information architecture's a framework that you guys essentially publish and communicate to your clients. It doesn't require that you have IBM products plugged in, but of course, you can certainly plug in. IBM products are. If you're smart enough to develop information architect here presumably, and you got to show where your products fit. You're gonna sell more stuff, but it's not a prerequisite. I confuse other tooling if I wanted to go there. The framework is a good >> prerequisite, the products and self of course, now right. But the framework is a good foundational. Construct around how you can think about it so that you can progress along that journey, >> right? You started talking about active fio. You're relationship there. See that created the Info sphere Virtual data pipeline, right? Why did you developed that product or we'll get into it? >> Sure, it's all part of our overall unified covers and integration portfolio. Like I said, that's that organized layer of the latter day I that I was referring to. And it's all about making sure you have clear visibility and knowing what they had assets that you have. So we always talk about in terms of no trust in use. No, the data assets you have. Make sure you understand the data quality in the classification around that data that you have trust the data, understand the lineage, understand how it's been Touch Haussmann, transformed building catalog around that data and then use and make sure it's usable to downstream applications of down street individuals. And the virtual data pipeline offering really helps us on that last category around using and making use of the data, the assets that you have putting it into directly into the hands of the users of that data. So whether they be data scientist and data engineers or application developers and testers. So the virtual data pipeline and the capabilities based on activity sky virtual appliance really help build a snapshot data provide the self service user interface to be able to get into the hands of application developers and testers or data engineers and data scientist. >> And why is that important? Is it because they're actually using the same O. R. O R. Substantially similar data sets across their their their their work stream. Maybe you could explain that it's important >> because the speed at which the applications are being built insights are being driven is requiring that there is a lot more agility and ability to self service into the data that you need. Traditional challenges that we see is you think about preparing to build an application or preparing to build an aye aye model, building it, deploy it and managing it the majority of the time. 80% of the time. Todd spilled front, preparing the data talking, trying to figure out what data you need asking for and waiting for two weeks to two months to try to get access to that data getting. And they're realizing, Oh, I got the wrong data. I need to supplement that. I need to do another iteration of the model going back to try to get more data on. That's you have the area that application developers and data scientists don't necessarily want to be spending their >> time on. >> And so >> we're trying to shrink >> that timeframe. And how do we shrink? That is by providing business users our line of business users, data scientist application developers with the individuals that are actually using the data to provide their own access to it, right To be able to get that snapshot that point in time, access to that point of production data to be able to then infuse it into their development process. They're testing process or the analytic development process >> is we're we're do traditional tooling were just traditional tooling fit in this sort of new world because you remember what the Duke came out. It was like, Oh, that enterprise data warehouses dead. And then you ask customers like What's one of the most important things you're doing in your big data? Play blind and they'd say, Oh, yeah, we need R w. So I could now collect more data for lower costs keep her longer low stuff. But the traditional btw was still critical, but well, you were just describing, you know, building a cube. You guys own Cognos Obviously, that's one of the biggest acquisitions that I'm being made here is a critical component. Um, you talk about data quality, integration, those things. It's all the puzzle fits together in this larger mosaic and help us understand that. Sure >> and well, One of the fundamental things to understand is you have to know what you have right, and the data catalogue is a critical component of that data strategy. Understanding where your enterprise assets sit, they could be structured information that may be a instruction information city and file repositories or e mails, for example. But understanding what you have, understanding how it's been touched, how it's been used, understanding the requirements and limitations around that data understanding. Who are the owners of that data? So building that catalog view of your overall enterprise assets fundamental starting point from a governess standpoint. And then from there, you can allow access to individuals that are interested in understanding and leveraging that date assets that you may have in one pool here challenges data exists across enterprise everywhere. Right silos that may have rose in one particular department that then gets murdered in with another department, and then you have two organization that may not even know what the other individual has. So the challenge is to try to break down those silos, get clarity of the visibility around what assets so that individuals condemned leverage that data for whatever uses they may have, whether it be development or testing or analytics. >> So if I could generalize the problem, Yeah, too much data, not enough value. And I'll talk about value in terms of things that you guys do that I'm inferring. Risk reduction. Correct uh, speed to insights. Andan. Ultimately, lowering costs are increasing revenue. That's kind of what it's all >> the way to talk about business outcomes in terms of increase revenue, decrease costs or reduce risk, right in terms of governance, those air the three things that you want to unlock for your customers and you don't think about governance and creating new revenue streams. We generally don't think about in terms of reducing costs, but you do think about it oftentimes in terms of reducing your risk profile and compliance. But the ability to actually know your data built trust and then use that data really does open up different opportunities to actually build new application new systems of engagement uses a record new applications around analytics and a I that will unlock those different ways that we can market to customers. Cell two customers engage our own employees. >> Yes. So the initial entry into the organism the budget, if you will, is around that risk reduction. Right? Can you stand that? I got all this data and I need to make sure that I'm managing a corner on the edicts of my organization. But you actually seeing we play skeptic, you're really seeing value beyond that risk reduction. I mean, it's been nirvana in the compliance and governance world, not just compliance and governance and, you know, avoiding fees and right getting slapped on the wrist or even something worse? Sure, but we can actually, through the state Equality Initiative and integration, etcetera, etcetera Dr. Other value. You actually seeing that? >> Yes. We are actually, particularly last year with the whole onslaught of GDP are in the European Union, and the implications of GDP are here in the U. S. Or other parts of the world. Really was a pervasive topic on a lot of what we were talking about was specifically that compliance make sure you stay on the right side of the regulation, but the same time investing in that data architecture, information, architecture, investing in the governance programme actually allowed our customers to understand the different components that are touching the individual. Because it's all about individual rights and individual privacy. It's understanding what they're buying, understanding what information we're collecting on them, understanding what permissions and consent that we have, the leverage their information really allowed. Our customers actually delivered that information and for a different purpose. Outside of the whole compliance mindset is compliance is a difficult nut to crack. There's requirements around it, but at the same time, they're our best effort requirements around that as well. So the driver for us is not necessarily just about compliance, But it's about what more can you do with that govern data that you already have? Because you have to meet those compliance department anyway, to be able to flip the script and talk about business value, business impact revenue, and that's everything. >> Now you So you're only about what, six months in correct this part of the partnership? All right, so it's early days, but how's it going and what can we expect going forward? >> Don't. Great. We have a terrific partner partnership with Octavio, Like tippy a virtual Or the IBM virtual data pipeline offering is part of our broader portfolio within unified governance and fits nicely to build out some of the test data management capability that we've already had. Optimal portfolio is part of our capability. Said it's really been focused around test data management building synthetic data, orchestrating test data management as well. And the virtual data pipeline offering actually is a nice compliment to that to build out our the robust portfolio now. >> All right, Charlie. Well, hey, thanks very much for coming in the house. The event >> has been terrific. It's been terrific. It's It's amazing to be surrounded by so many people that are excited about data. We don't get that everywhere. >> They were always excited about, Right, Charlie? Thanks so much. Thank you. Thank you. All right. Keep it right there, buddy. We're back with our next guest. A Valon Day, John. Furry and student Amanda in the house. You're watching the cube Active eo active Fio data driven. 2019. Right back

Published Date : Jun 19 2019

SUMMARY :

It's the queue covering active eo We're covering the active FIO data driven Happy to be here. They since evolved that you guys are doing a lot of partnerships together. Leveraging data in the contacts and the pursuit of analytics and a portion of the business that I'm part of his unified governance and integration and you think about data and I as a whole, You know, probably Rob Thomas is, and I want a double click on what you just said. or analytical cases, and the information architecture is really about How do you frame your data So the information architecture's a framework that you guys essentially publish and communicate to your clients. But the framework is a good foundational. See that created the Info sphere Virtual No, the data assets you have. Maybe you could explain that it's important preparing the data talking, trying to figure out what data you need asking for and waiting They're testing process or the analytic development process You guys own Cognos Obviously, that's one of the biggest acquisitions that I'm being made here is a critical component. and the data catalogue is a critical component of that data strategy. So if I could generalize the problem, Yeah, too much data, not enough value. But the ability to actually know your data built trust on the edicts of my organization. and the implications of GDP are here in the U. S. Or other parts of the world. And the virtual data pipeline offering actually is a nice compliment to that to build out our the robust portfolio now. All right, Charlie. It's It's amazing to be surrounded by so many people that are excited about data. Furry and student Amanda in the house.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
David LockePERSON

0.99+

IBMORGANIZATION

0.99+

Rob ThomasPERSON

0.99+

CharliePERSON

0.99+

John BarrierPERSON

0.99+

80%QUANTITY

0.99+

six monthsQUANTITY

0.99+

two weeksQUANTITY

0.99+

two monthsQUANTITY

0.99+

Charlie KwonPERSON

0.99+

last yearDATE

0.99+

BostonLOCATION

0.99+

AmandaPERSON

0.99+

2019DATE

0.99+

Second yearQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

Charlie QuanisPERSON

0.99+

end of 2018DATE

0.99+

Active TheoORGANIZATION

0.99+

two organizationQUANTITY

0.98+

U. S.LOCATION

0.98+

two customersQUANTITY

0.98+

one poolQUANTITY

0.98+

firstQUANTITY

0.98+

oneQUANTITY

0.97+

DukeORGANIZATION

0.96+

Touch HaussmannORGANIZATION

0.96+

OctavioORGANIZATION

0.95+

TheoPERSON

0.95+

Info sphereORGANIZATION

0.94+

CognosORGANIZATION

0.94+

OneQUANTITY

0.91+

three thingsQUANTITY

0.91+

ToddPERSON

0.87+

ActifioTITLE

0.86+

19QUANTITY

0.86+

CubeCOMMERCIAL_ITEM

0.79+

double clickQUANTITY

0.79+

IBN OverallORGANIZATION

0.76+

eo 2019EVENT

0.69+

European UnionORGANIZATION

0.69+

one particular departmentQUANTITY

0.67+

Valon DayPERSON

0.57+

JohnPERSON

0.56+

John Apostolopoulos Anand Oswal & Anand Oswal, Cisco | Cisco Live US 2019


 

>> Live from San Diego, California It's the queue covering Sisqo live US 2019 Tio by Cisco and its ecosystem. Barker's >> Welcome back to San Diego. Everybody watching the Cube, the leader and live check coverage. My name is David Locke. I'm here with my co host student in recovering Day to hear Sisqo live. 2019 on. On On. On on. Oswald is here. Excuse me. Sees the senior vice president of enterprise networking Engineering at Cisco. And John A postal, a polis. Italians in the Greeks. We have a lot in common. He is the VP and CTO of Enterprise Network. And get Sisko. Gentlemen, welcome to the Cube. How'd I do? Do you know it? Also, that you're bad, right? Thank you. All right, Good. Deal it out. Let's start with you. You guys have had a bunch of news lately. Uh, you're really kind of rethinking access to the network. Can you explain what's behind that to our audience? >> Yeah, even think about it. The network is getting has running more and more critical. Infrastructure at the same time is increasing. Bottom scale and complexity. What? We expected that you'll only be obvious. Violence on workspace is on the move. Are you? You're working here in your office, in the cafe, The sock off everywhere you want. An uninterrupted unplugged experience for that is violence. First, it's cloud driven and is dead optimist. So we had to rethink our way to access. It's not just about your laptops and your fool on the wireless network. In the end of the digital management systems, Coyote devices, everything is going to provide us with means reaching the access on that. But >> so, John, this obviously ties into, you know, you hear all the buzz about five g and WiFi. Six. Can you explain the connection? And you know what? We need to know about that. >> Okay, it's so fine. Five. Jean WiFi 62 new wireless technologies coming about now, and they're really awesome. So y fi six is the new version. WiFi. It's available today, and it's going to be available for down predominately indoors as wi WiFi indoors and high density environments where you need a large number. Large data bait for square meter una WiFi. Once again, the new WiFi six fight in the coverage indoors uh, five is going to be used predominately outdoors in the cellular frequency. Replacing conventional for Geo lt will provide you The broad coverage is your roam around outdoors. And what happens, though, is we need both. You need great coverage indoors, which wife Isis can provide, and you need great coverage outdoors. Which five year cried >> for G explosion kind of coincided with mobile yet obviously, and that caused a huge social change. And, of course, social media took off. What should we expect with five G? Is it? You know, I know adoption is gonna take a while. I'll talk about that, but it feels like it's more sort of be to be driven, but but maybe not. Can you >> see why 5 65 gr actually billions Some similar fundamental technology building blocks? You know you will be in the ball game for the Warriors game like a few weeks ago when they were winning on DH. After a bit of time to send that message. Video your kid something on the WiFi slow laden Z with WiFi, 61 have a problem. The WiFi six has four times the late in C 14. The throughput and capacity has existing y find Lowell Agency and also the battery life. You know, people say that that is the most important thing today. Like in the mass Maharaj three times the battery life for WiFi, 16 points. So you're gonna see a lot of use cases where you have inter walking within 556 and five g WiFi six foot indoors and find you for outdoor and some small overlap. But the whole idea is how do you ensure that these two disparate access networks are talking to each other explaining security policy and it is invisibility. >> Okay, so first what? Your warriors fan, right? Yeah. Awesome way. Want to see the Siri's keep going, baby? That was really exciting. Because I'm a Bruins fan, sir, on the plane the other night and in the JetBlue TV. Shut down, you know, So I immediately went to the mobile, But it was terrible experience, and I was going crazy checks in my friends. What's happening? You say that won't happen? Yeah, with five Julia and WiFi sexy. Exactly. Awesome. >> So, John, help connect for us. Enterprise. Not working. We've been talking about the new re architectures. You know, there's a c I there now intent based networking. How does this play into the five G and WiFi six discussion that we're having today? >> So one of the things that really matters to our customers and for everybody, basically, they want these sort of entering capability. They had some device is they want to talk to applications. They want access to data. We want to talk with other people or try ot things. So you need this sort of end twin capability wherever the ends are. So one of the things I've been working on a number of years now it's first all intent Basin that working, which we announced two and 1/2 years ago. And then multi domain, we try to connect across the different domains. Okay, well across campus and when, and data center all the way to the cloud and across the Service Fighter network and trad security has foundational across all of these. This was something that David Buckler and Chuck Robbins talked about at their keynote yesterday, and this is a huge area for us because we're going to make this single orchestrated capability crop customers to connect and to and no matter where the end of ices are >> alright so sewn on I have to believe that it's not the port, you know, administrator saying, Oh my God, I have all these signs of them. Is this where machine learning in A I come in to help me with all these disparate system absolutely are going very simple. Any user on any device had access to any application. Sitting in a data center in a cloud of multiple clouds over any network, you want that securely and seamlessly. You also wanna have nature. Its whole network is orchestrator automated, and you're the right visibility's recipes for idea on with the business insights on the eye. An ML. What's happening is there for the next book is going in complexity and skill. The number of alerts are growing up, so you are not able to figure it out. That's where the power of a I and machine learning comes. Think about it in the industry revolution, the Industrial Revolution made sure that you are. You don't have limitations or what humans can do right, like machines. And now we want to make sure businesses can benefit in the digital revolution, you know, in limited by what I can pass through all the logs and scrolls on ornament. Everything and that's the power of air and machine learning >> are there use cases where you would want some human augmentation. We don't necessarily want the machine taking over for you or Or Do you see this as a fully automated type of scenario? >> Yeah, so what happens is first ball visibility is really, really important. The operator of an effort wants the visibility and they want entwined across all these domains. So the first thing we do is we apply a lot of machine learning to get to take that immense amount of data is an unmentioned and to translate it into piece of information to insights into what's happening so that we could share to the user. And they can have visibility in terms of what's happened, how well it's happening. Are they anomalies? Are is this security threat so forth? And then we can find them additional feedback. Hate. This is anomaly. This could be a problem. This is the root cause of the problem, and we believe these are the solutions for what do you want to do? You wantto Do you want actuate one of these solutions and then they get to choose. >> And if you think of any other way, our goal is really take the bits and bytes of data on a network. Convert that data into information that information into insights that inside that lead to outcomes. Now you want. Also make sure that you can augment the power of a machine. Learning on those insights, you can build on exactly what's happening. For example, you want first baseline, your network, what's normal for your environment and when you have deviations and that anomalies. Then, you know, I don't know exactly what the problem is. Anyone automated the mediation of the problem. That's the power of A and women you >> When you guys as engineers, when you think about, you know, applying machine intelligence, there's a lot of, you know, innovation going on there. Do you home grow that? Do you open source it? Do you borrow? Explain the philosophy there in terms of it. From a development standpoint, >> development point of it is a combination of off all the aspects, like we will not green when they leave it all the exists. But it's always a lot of secrets are that you need to apply because everything flows through the network, right? If everything first netbooks, this quarter of information is not just a data link, their data source as well. So taking this district's also information. Normalizing it, harmonizing it, getting a pretty language. Applying the Alberta and machine learning, for example. We do that model, model learning and training in the clouds. Way to infants in the cloud, and you pushed the rules down. There's a combination, all of all, of that >> right, and you use whatever cloud tooling is available. But it sounds like it's really from an interest from a Cisco engineering standpoint. It's how you apply the machine intelligence for the benefit of your customers and those outcomes versus us. Thinking of Sisko is this new way I company right. That's not the ladder. It's the former. Is that >> fair? One of the things that's really important is that, as you know, Cisco has been making, uh, we've been designing a six for many years with really, really rich telemetry and, as you know, Data's key to doing good machine learning and stuff. So I've been designing the A six to do really time at wire speed telemetry and also to do various sorts of algorithmic work on the A six. Figure out. Hey, what is the real data you want to send up? And then we have optimized the OS Iowa sexy to be able to perform various algorithms there and also post containers where you could do more more machine learning at the switch at the router, even in the future, maybe at the A P and then with DNA Center way, have been able to gather all the data together in a single data life where we could form a machine learning on top. >> That's important, Point John mentioned, because you want Leo want layers and analytics. And that's why the cattle's 91 191 20 access point we launch has Cisco are basic that provides things like cleaning for spectrum were also the analytic from layer one level are literally a seven. I really like the line, actually from Chuck Robbins, yesterday said. The network sees everything, and Cisco wants to give you that visibility. Can you walk us through some of the new pieces? What, what what people, Either things that they might not have been aware of our new announcements this week as part of the Sisko, a network analytics, announced three things. First thing is automated based lining. What it really means. Is that what's normal for your environment, right? Because what's normal for your own environment may not be the same for my environment. Once I understand what that normal baseline is, then, as I have deviations I canto anomaly detection, I can call it an aggregate issues I can really bring down. Apply here and machine learning and narrow down the issues that are most critical for you to look at right now. Once and Aragon exact issue. I wanted the next thing, and that is what we call machine. Reasoning on machine reasoning is all about ordering the workflow off what you need to do to debug and fix the problem. You want the network to become smarter and smarter, the more you use it on. All of this is done through model learning and putting in the clouds infants in the cloud and pushing it down the rules as way have devices on line on time. So, >> do you see the day? If you think about the roadmap for for machine intelligence, do you see the day where the machine will actually do the remediation of that workflow. >> Absolutely. That's what we need to get you >> when you talk about the automated base lining is obviously a security, you know, use case there. Uh, maybe talk about that a little bit. And are there others? It really depends on your objective, right? If my objective is to drive more efficiency, lower costs, I presume. A baseline is where you start, right? So >> when I say baseline what I mean really, like, say, if I tell you that from this laptop to connect on a WiFi network, it took you three seconds and ask, Is that good or bad? You know, I don't know what the baseline for his environment. What's normal next time? If you take eight seconds on your baseline street, something is wrong. But what is wrong isn't a laptop issue isn't a version on the on your device is an application issue on network issue and our issue I don't know. That's why I'm machine learning will do exactly what the problem is. And then you use machine reasoning to fix a problem. >> Sorry. This is probably a stupid question, but how much data do you actually need. And how much time do you need to actually do a good job in that? That type of use case? >> What happens is you need the right data, Okay? And you're not sure where the right data is originally, which we do a lot of our expertise. It's this grass for 20 years is figuring out what the right data is and also with a lot of machine learning. We've done as well as a machine reason where we put together templates and so forth. We've basically gathered the right made for the right cause for the customer. And we refined that over time. So over time, like this venue here, the way this venue network, what it is, how it operates and so forth varies with time. We need to weigh need to refine that over time, keep it up to date and so forth. >> And when we talk about data, we're talking about tons of metadata here, right? I mean, do you see the day where there'll be more metadata than data? Yeah, it's a rhetorical question. All right, so So it's true you were hearing >> the definite zone. Lots of people learning about a building infrastructure is code. Tell us how the developer angle fits into what we've been discussing. >> Here we ask. So what happens is is part of intent based on African key parts of automation, right? And another key parts. The assurance. Well, it's what Devon it's trying to do right now by working with engineering with us and various partners are customers is putting together one of the key use cases that people have and what is code that can help them get that done. And what they're also doing is trying to the looking through the code. They're improving it, trying to instill best practice and stuff. So it's recently good po'd people can use and start building off. So we think this could be very valuable for our customers to help move into this more advanced automation and so forth. >> So architecture matters. We've touched upon it. But I want you to talk more about multi domain architectures wear Chuck Robbins. You know, talk about it. What is it? Why is it such a big deal on DH? How does it give Sisko competitive advantage? >> Think about it. I mean, my dad go being architectures. Nothing but all the components of a modern enterprise that look behind the scenes from giving access to a user or device to access for application and everything in between. Traditionally, each of these domains, like an access domain, the land domain can have 100 thousands off network know that device is. Each of these are configured General Manual to see a live my domain architectures almost teaching these various domains into one cohesive, data driven, automated programmable network. Your campus, your branch, your ran. But he doesn't and cloud with security as an integral part of it if it all. >> So it's really a customer view of an architecture isn't? Yeah, absolutely. Okay, that's good. I like that answer. I thought you're going to come out with a bunch of Cisco No mumbo jumbo in secret sauce. Now it really is you guys thinking about Okay, how would our customers need to architect there? >> But if you think about it, it's all about customer use case, for example, like we talked earlier today, we were walking everywhere on the bull's eye, in the cafe, in office and always on the goal. You're accessing your business school applications, whether it's webex salesforce dot com, 40 65. At the same time you're doing Facebook and what's happened. YouTube and other applications. Cisco has the van Domain will talk to Sisko. The domains action escalates and policies. So now you can cry tears the application that you want, which is business critical and fixing the night watchers but miss experience for you. But you want the best experience for that matter, where you are well >> on the security implications to I mean, you're basically busting down the security silos. Sort of the intent here, right? Right. Last thoughts on the show. San Diego last year. Orlando. We're in Barcelona earlier this year. >> I think it's been great so far. If you think about it in the last two years, we fill out the entire portfolio for the new access network when the cattle is 90. 100. Access points with WiFi six Switches Makes emission Campus core. Waterston, Controller Eyes for Unified Policy Data Center for Automation Analytics. Delia Spaces Business Insights Whole Access Network has been reinvented on It's a great time. >> Nice, strong summary, but John will give you the last word. >> What happens here is also everything about It says that we have 5,000 engineers have been doing this a couple years and we have a lot more in the pipe. So you're going to Seymour in six months from now Morn. Nine months and so forth. It's a very exciting time. >> Excellent. Guys. It is clear you like you say, completing the portfolio positioning for the next wave of of access. So congratulations on all the hard work I know a lot goes into it is Thank you very much for coming. All right, Keep it right there. David. Dante was stupid. And Lisa Martin is also in the house. We'll get back with the Cube. Sisqo live 2019 from San Diego.

Published Date : Jun 11 2019

SUMMARY :

Live from San Diego, California It's the queue covering Do you know it? in the cafe, The sock off everywhere you want. so, John, this obviously ties into, you know, you hear all the buzz about five g and WiFi. and high density environments where you need a large number. Can you But the whole idea is how do you ensure that these two disparate access networks Shut down, you know, So I immediately went to the mobile, We've been talking about the new re architectures. So one of the things that really matters to our customers and for everybody, basically, they want these sort of entering capability. alright so sewn on I have to believe that it's not the port, you know, are there use cases where you would want some human augmentation. and we believe these are the solutions for what do you want to do? That's the power of A and women you there's a lot of, you know, innovation going on there. But it's always a lot of secrets are that you need to apply because everything flows through the network, It's how you apply the machine intelligence for the benefit of your customers and those outcomes One of the things that's really important is that, as you know, Cisco has been making, the workflow off what you need to do to debug and fix the problem. do you see the day where the machine will actually do the remediation of that workflow. That's what we need to get you A baseline is where you start, right? And then you use machine reasoning to fix a problem. And how much time do you need to actually do a good job in that? What happens is you need the right data, Okay? All right, so So it's true you were the definite zone. So what happens is is part of intent based on African key parts of automation, But I want you to talk more about multi domain architectures wear the scenes from giving access to a user or device to access for application and Now it really is you guys thinking about Okay, how would our customers need to architect there? So now you can cry tears the application that you want, which is business critical and fixing the night on the security implications to I mean, you're basically busting down the security silos. If you think about it in the last two years, What happens here is also everything about It says that we have 5,000 engineers have been doing this a couple years and So congratulations on all the hard work I know a lot goes into it is Thank you very much

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

David LockePERSON

0.99+

DavidPERSON

0.99+

CiscoORGANIZATION

0.99+

BarcelonaLOCATION

0.99+

DantePERSON

0.99+

San DiegoLOCATION

0.99+

16 pointsQUANTITY

0.99+

JohnPERSON

0.99+

John ApostolopoulosPERSON

0.99+

SiskoPERSON

0.99+

90. 100QUANTITY

0.99+

Chuck RobbinsPERSON

0.99+

three secondsQUANTITY

0.99+

SiriTITLE

0.99+

eight secondsQUANTITY

0.99+

eachQUANTITY

0.99+

yesterdayDATE

0.99+

Anand OswalPERSON

0.99+

OrlandoLOCATION

0.99+

San Diego, CaliforniaLOCATION

0.99+

last yearDATE

0.99+

100 thousandsQUANTITY

0.99+

IsisPERSON

0.99+

40 65OTHER

0.99+

EachQUANTITY

0.99+

OswaldPERSON

0.99+

5,000 engineersQUANTITY

0.99+

FirstQUANTITY

0.99+

David BucklerPERSON

0.99+

sixQUANTITY

0.99+

SeymourPERSON

0.99+

six SwitchesQUANTITY

0.99+

LeoPERSON

0.99+

Lowell AgencyORGANIZATION

0.98+

this weekDATE

0.98+

OneQUANTITY

0.98+

SiskoORGANIZATION

0.98+

four timesQUANTITY

0.98+

oneQUANTITY

0.98+

bothQUANTITY

0.98+

todayDATE

0.98+

FacebookORGANIZATION

0.98+

three timesQUANTITY

0.98+

CoyoteORGANIZATION

0.98+

Nine monthsQUANTITY

0.97+

Enterprise NetworkORGANIZATION

0.97+

YouTubeORGANIZATION

0.97+

earlier this yearDATE

0.96+

billionsQUANTITY

0.96+

A sixCOMMERCIAL_ITEM

0.96+

first ballQUANTITY

0.96+

five gQUANTITY

0.96+

five yearQUANTITY

0.96+

three thingsQUANTITY

0.95+

USLOCATION

0.95+

20 yearsQUANTITY

0.95+

2019DATE

0.94+

six monthsQUANTITY

0.94+

First thingQUANTITY

0.93+

91 191 20OTHER

0.93+

fiveQUANTITY

0.93+

firstQUANTITY

0.93+

sevenQUANTITY

0.92+

singleQUANTITY

0.92+

1/2 years agoDATE

0.91+

SisqoPERSON

0.91+

Service FighterORGANIZATION

0.9+

few weeks agoDATE

0.89+

last two yearsDATE

0.87+

first netbooksQUANTITY

0.87+

556QUANTITY

0.87+

two disparate access networksQUANTITY

0.86+